{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:32:25Z","timestamp":1768311145801,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642336775","type":"print"},{"value":"9783642336782","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33678-2_26","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T15:02:42Z","timestamp":1346943762000},"page":"305-316","source":"Crossref","is-referenced-by-count":20,"title":["A Systematic Approach to Justifying Sufficient Confidence in Software Safety Arguments"],"prefix":"10.1007","author":[{"given":"Anaheed","family":"Ayoub","sequence":"first","affiliation":[]},{"given":"BaekGyu","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Sokolsky","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Federal\u00a0Aviation Administration. FAA System Safety Handbook, ch 8: Safety Analysis\/Hazard Analysis Tasks. System 40(4) (2000)"},{"key":"26_CR2","unstructured":"Alexander, R., Kelly, T., Kurd, Z., Mcdermid, J.: Safety Cases for Advanced Control Software: Safety Case Patterns. Technical report. University of York (2007)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-28891-3_14","volume-title":"NASA Formal Methods","author":"A. Ayoub","year":"2012","unstructured":"Ayoub, A., Kim, B., Lee, I., Sokolsky, O.: A Safety Case Pattern for Model-Based Development Approach. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol.\u00a07226, pp. 141\u2013146. Springer, Heidelberg (2012)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G. Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A Tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol.\u00a03185, pp. 200\u2013236. Springer, Heidelberg (2004)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Littlewood, B., Wright, D.: Confidence: Its Role in Dependability Cases for Risk Assessment. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2007, pp. 338\u2013346 (2007)","DOI":"10.1109\/DSN.2007.29"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-87698-4_25","volume-title":"Computer Safety, Reliability, and Security","author":"\u0141. Cyra","year":"2008","unstructured":"Cyra, \u0141., G\u00f3rski, J.: Expert Assessment of Arguments: A Method and Its Experimental Evaluation. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol.\u00a05219, pp. 291\u2013304. Springer, Heidelberg (2008)"},{"key":"26_CR7","volume-title":"International Symposium on Empirical Software Engineering and Measurement (ESEM 2011)","author":"E. Denney","year":"2011","unstructured":"Denney, E., Pai, G., Habli, I.: Towards Measurement of Confidence in Safety Cases. In: International Symposium on Empirical Software Engineering and Measurement (ESEM 2011). IEEE Computer Society, Washington, DC (2011)"},{"key":"26_CR8","unstructured":"The Generic Patient Controlled Analgesia Pump Model, http:\/\/rtg.cis.upenn.edu\/gip.php3"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Habli, I., Kelly, T.: Achieving Integrated Process and Product Safety Arguments. In: The 15th Safety Critical Systems Symposium (SSS 2007). Springer (2007)","DOI":"10.1007\/978-1-84628-806-7_4"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Hawkins, R., Kelly, T.: Software Safety Assurance \u2013 What Is Sufficient?. In: 4th IET International Conference of System Safety (2009)","DOI":"10.1049\/cp.2009.1542"},{"key":"26_CR11","first-page":"3","volume-title":"19th Safety Critical Systems Symposium (SSS 2011)","author":"R. Hawkins","year":"2011","unstructured":"Hawkins, R., Kelly, T., Knight, J., Graydon, P.: A New Approach to creating Clear Safety Arguments. In: 19th Safety Critical Systems Symposium (SSS 2011), pp. 3\u201323. Springer, London (2011)"},{"key":"26_CR12","unstructured":"Kelly, T.: A six-step Method for Developing Arguments in the Goal Structuring Notation (GSN). Technical report. York Software Engineering, UK (1998)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Kelly, T.: Arguing safety \u2013 a systematic approach to managing safety cases. PhD thesis. Department of Computer Science, University of York (1998)","DOI":"10.1007\/3-540-48249-0_2"},{"key":"26_CR14","unstructured":"Kelly, T.: Reviewing Assurance Arguments \u2013 A Step-by-Step Approach. In: Workshop on Assurance Cases for Security - The Metrics Challenge, Dependable Systems and Networks, DSN (2007)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Kim, B., Ayoub, A., Sokolsky, O., Jones, P., Zhang, Y., Jetley, R., Lee, I.: Safety-Assured Development of the GPCA Infusion Pump Software. In: EMSOFT, Taipei, Taiwan, pp. 155\u2013164 (2011)","DOI":"10.1145\/2038642.2038667"},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-1-84882-349-5_15","volume-title":"Safety-Critical Systems: Problems, Process and Practice","author":"C. Menon","year":"2009","unstructured":"Menon, C., Hawkins, R., McDermid, J.: Defence standard 00-56 issue 4: Towards evidence-based safety standards. In: Safety-Critical Systems: Problems, Process and Practice, pp. 223\u2013243. Springer, London (2009)"},{"key":"26_CR17","unstructured":"Ministry of Defence (MoD) UK. Defence Stanandard 00-56 Issue 4: Safety Management Requirements for Defence Systems (2007)"},{"key":"26_CR18","unstructured":"U.S. Food and Drug Administration, Center for Devices and Radiological Health. Guidance for Industry and FDA Staff - Total Product Life Cycle: Infusion Pump - Premarket Notification [510(k)] Submissions (April 2010)"},{"key":"26_CR19","unstructured":"Weaver, R.: The Safety of Software - Constructing and Assuring Arguments. PhD thesis, Department of Computer Science, University of York (2003)"},{"key":"26_CR20","unstructured":"Ye, F.: Contract-based justification for COTS component within safety-critical applications. PhD thesis, Department of Computer Science, University of York (2005)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33678-2_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T10:57:55Z","timestamp":1643367475000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33678-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336775","9783642336782"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33678-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}